The power of trusted endpoints
The story of digital authentication started in an MIT lab in 1961, when a group of computer scientists got together and devised the concept of passwords. Little did they know …
Take back control of IT with cloud native IGA
For many organizations, working with the current identity access management (IAM) and identity governance and administration (IGA) solutions is like driving a 20-year-old car: …
Cybersecurity training: Learn how to secure containerized environments
Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab …
Global number of industrial IoT connections to reach 36.8 billion by 2025
The global number of industrial IoT connections will increase from 17.7 billion in 2020 to 36.8 billion in 2025, representing an overall growth rate of 107%, Juniper Research …
Video series: Get into the phisher’s mind
Check out this series to understand the phisher’s perspective and better defend your organization from cyber threats. In this series of videos, BitDam’s cyber expert, Roy …
Ermetic’s platform provides full stack visibility and control over multi-cloud infrastructure entitlements
Ermetic announced a platform that provides full stack visibility and control over multi-cloud infrastructure entitlements. By analyzing identity and access management (IAM) …
Confluera partners with 3SG Plus to expand the Confluera 2020 Reseller Program
Confluera announced its partnership with 3SG Plus as part of the new Confluera 2020 Reseller Program. The expansion of the program continues Confluera’s momentum in the XDR …
Entersekt appoints Nicolas Huss to its board of directors
Entersekt announced the appointment of Nicolas Huss to its board of directors. In the twenty years he has been active in financial services and payments, Huss has built a …
Qualys Container Runtime Security: Defense for containerized applications
Qualys announced Container Runtime Security, which provides runtime defense capabilities for containerized applications. Qualys Runtime Container Security This new approach …
Google fixes two actively exploited Chrome zero-days (CVE-2020-16009, CVE-2020-16010)
For the third time in two weeks, Google has patched Chrome zero-day vulnerabilities that are being actively exploited in the wild: CVE-2020-16009 is present in the desktop …
Review: Specops Password Policy
Specops Password Policy is a powerful tool for overcoming the limitations of the default password policies present in Microsoft Active Directory environments. To be fair, …
How to deal with the escalating phishing threat
In today’s world, most external cyberattacks start with phishing. For attackers, it’s almost a no-brainer: phishing is cheap and humans are fallible, even after …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month